4 results (0.005 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

A vulnerability was found in zstd v1.4.10, where an attacker can supply empty string as an argument to the command line tool to cause buffer overrun. Se encontró una vulnerabilidad en zstd v1.4.10, donde un atacante puede proporcionar una cadena vacía como argumento a la herramienta de línea de comando para provocar una saturación del búfer. • https://github.com/facebook/zstd/issues/3200 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN https://security.netapp.com/advisory/ntap-20230725-0005 https://access.redhat.com/security/cve/CVE-2022-4899 https:/ • CWE-400: Uncontrolled Resource Consumption •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

Beginning in v1.4.1 and prior to v1.4.9, due to an incomplete fix for CVE-2021-24031, the Zstandard command-line utility created output files with default permissions and restricted those permissions immediately afterwards. Output files could therefore momentarily be readable or writable to unintended parties. A partir de la versión v1.4.1 y anterior a la v1.4.9, debido a una solución incompleta para el CVE-2021-24031, la utilidad de línea de comandos Zstandard creó archivos de salida con permisos predeterminados y restringió esos permisos inmediatamente después. Por lo tanto, los archivos de salida podrían ser momentáneamente legibles o escribibles para personas no deseadas A flaw was found in zstd. While the final file mode is reflective of the input file, when compressing or uncompressing, the file can temporarily gain greater permissions than the input and potentially leading to security issues (especially if large files are being handled). • https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982519 https://github.com/facebook/zstd/issues/2491 https://www.facebook.com/security/advisories/cve-2021-24032 https://access.redhat.com/security/cve/CVE-2021-24032 https://bugzilla.redhat.com/show_bug.cgi?id=1928090 • CWE-276: Incorrect Default Permissions CWE-277: Insecure Inherited Permissions CWE-281: Improper Preservation of Permissions •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 2

In the Zstandard command-line utility prior to v1.4.1, output files were created with default permissions. Correct file permissions (matching the input) would only be set at completion time. Output files could therefore be readable or writable to unintended parties. En la utilidad Zstandard command-line versiones anteriores a v1.4.1, los archivos de salida se creaban con permisos predeterminados. Los permisos de archivo correctos (que coincidan con la entrada) solo se establecerán en el momento de la completación. • https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981404 https://github.com/facebook/zstd/issues/1630 https://www.facebook.com/security/advisories/cve-2021-24031 • CWE-276: Incorrect Default Permissions CWE-277: Insecure Inherited Permissions •

CVSS: 8.1EPSS: 3%CPEs: 1EXPL: 0

A race condition in the one-pass compression functions of Zstandard prior to version 1.3.8 could allow an attacker to write bytes out of bounds if an output buffer smaller than the recommended size was used. Una condición de carrera en las funciones de compresión de un paso (one-pass) de Zstandard anterior a versión 1.3.8, podría permitir a un atacante escribir bytes fuera de límites si es utilizado un búfer de salida más pequeño que el tamaño recomendado . • http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00008.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00062.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00078.html https://github.com/facebook/zstd/pull/1404/commits/3e5cdf1b6a85843e991d7d10f6a2567c15580da0 https://usn.ubuntu.com/4108-1 https://www.facebook.com/security/advisories/cve-2019-11922 https://www.oracle.com/security-alerts/cpuoct2020.html • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •